Documentation ¶
Overview ¶
+kubebuilder:object:generate=true +groupName=approle.vault.upbound.io +versionName=v1alpha1
Index ¶
- Constants
- Variables
- type AuthBackendLogin
- func (in *AuthBackendLogin) DeepCopy() *AuthBackendLogin
- func (in *AuthBackendLogin) DeepCopyInto(out *AuthBackendLogin)
- func (in *AuthBackendLogin) DeepCopyObject() runtime.Object
- func (mg *AuthBackendLogin) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *AuthBackendLogin) GetConnectionDetailsMapping() map[string]string
- func (mg *AuthBackendLogin) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *AuthBackendLogin) GetID() string
- func (tr *AuthBackendLogin) GetInitParameters() (map[string]any, error)
- func (mg *AuthBackendLogin) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *AuthBackendLogin) GetObservation() (map[string]any, error)
- func (tr *AuthBackendLogin) GetParameters() (map[string]any, error)
- func (mg *AuthBackendLogin) GetProviderConfigReference() *xpv1.Reference
- func (mg *AuthBackendLogin) GetProviderReference() *xpv1.Reference
- func (mg *AuthBackendLogin) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *AuthBackendLogin) GetTerraformResourceType() string
- func (tr *AuthBackendLogin) GetTerraformSchemaVersion() int
- func (mg *AuthBackendLogin) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *AuthBackendLogin) LateInitialize(attrs []byte) (bool, error)
- func (mg *AuthBackendLogin) SetConditions(c ...xpv1.Condition)
- func (mg *AuthBackendLogin) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *AuthBackendLogin) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *AuthBackendLogin) SetObservation(obs map[string]any) error
- func (tr *AuthBackendLogin) SetParameters(params map[string]any) error
- func (mg *AuthBackendLogin) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *AuthBackendLogin) SetProviderReference(r *xpv1.Reference)
- func (mg *AuthBackendLogin) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *AuthBackendLogin) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type AuthBackendLoginInitParameters
- type AuthBackendLoginList
- type AuthBackendLoginObservation
- type AuthBackendLoginParameters
- type AuthBackendLoginSpec
- type AuthBackendLoginStatus
- type AuthBackendRole
- func (in *AuthBackendRole) DeepCopy() *AuthBackendRole
- func (in *AuthBackendRole) DeepCopyInto(out *AuthBackendRole)
- func (in *AuthBackendRole) DeepCopyObject() runtime.Object
- func (mg *AuthBackendRole) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *AuthBackendRole) GetConnectionDetailsMapping() map[string]string
- func (mg *AuthBackendRole) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *AuthBackendRole) GetID() string
- func (tr *AuthBackendRole) GetInitParameters() (map[string]any, error)
- func (mg *AuthBackendRole) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *AuthBackendRole) GetObservation() (map[string]any, error)
- func (tr *AuthBackendRole) GetParameters() (map[string]any, error)
- func (mg *AuthBackendRole) GetProviderConfigReference() *xpv1.Reference
- func (mg *AuthBackendRole) GetProviderReference() *xpv1.Reference
- func (mg *AuthBackendRole) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *AuthBackendRole) GetTerraformResourceType() string
- func (tr *AuthBackendRole) GetTerraformSchemaVersion() int
- func (mg *AuthBackendRole) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *AuthBackendRole) LateInitialize(attrs []byte) (bool, error)
- func (mg *AuthBackendRole) SetConditions(c ...xpv1.Condition)
- func (mg *AuthBackendRole) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *AuthBackendRole) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *AuthBackendRole) SetObservation(obs map[string]any) error
- func (tr *AuthBackendRole) SetParameters(params map[string]any) error
- func (mg *AuthBackendRole) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *AuthBackendRole) SetProviderReference(r *xpv1.Reference)
- func (mg *AuthBackendRole) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *AuthBackendRole) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type AuthBackendRoleInitParameters
- type AuthBackendRoleList
- type AuthBackendRoleObservation
- type AuthBackendRoleParameters
- type AuthBackendRoleSecretID
- func (in *AuthBackendRoleSecretID) DeepCopy() *AuthBackendRoleSecretID
- func (in *AuthBackendRoleSecretID) DeepCopyInto(out *AuthBackendRoleSecretID)
- func (in *AuthBackendRoleSecretID) DeepCopyObject() runtime.Object
- func (mg *AuthBackendRoleSecretID) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *AuthBackendRoleSecretID) GetConnectionDetailsMapping() map[string]string
- func (mg *AuthBackendRoleSecretID) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *AuthBackendRoleSecretID) GetID() string
- func (tr *AuthBackendRoleSecretID) GetInitParameters() (map[string]any, error)
- func (mg *AuthBackendRoleSecretID) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *AuthBackendRoleSecretID) GetObservation() (map[string]any, error)
- func (tr *AuthBackendRoleSecretID) GetParameters() (map[string]any, error)
- func (mg *AuthBackendRoleSecretID) GetProviderConfigReference() *xpv1.Reference
- func (mg *AuthBackendRoleSecretID) GetProviderReference() *xpv1.Reference
- func (mg *AuthBackendRoleSecretID) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *AuthBackendRoleSecretID) GetTerraformResourceType() string
- func (tr *AuthBackendRoleSecretID) GetTerraformSchemaVersion() int
- func (mg *AuthBackendRoleSecretID) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *AuthBackendRoleSecretID) LateInitialize(attrs []byte) (bool, error)
- func (mg *AuthBackendRoleSecretID) SetConditions(c ...xpv1.Condition)
- func (mg *AuthBackendRoleSecretID) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *AuthBackendRoleSecretID) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *AuthBackendRoleSecretID) SetObservation(obs map[string]any) error
- func (tr *AuthBackendRoleSecretID) SetParameters(params map[string]any) error
- func (mg *AuthBackendRoleSecretID) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *AuthBackendRoleSecretID) SetProviderReference(r *xpv1.Reference)
- func (mg *AuthBackendRoleSecretID) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *AuthBackendRoleSecretID) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type AuthBackendRoleSecretIDInitParameters
- type AuthBackendRoleSecretIDList
- func (in *AuthBackendRoleSecretIDList) DeepCopy() *AuthBackendRoleSecretIDList
- func (in *AuthBackendRoleSecretIDList) DeepCopyInto(out *AuthBackendRoleSecretIDList)
- func (in *AuthBackendRoleSecretIDList) DeepCopyObject() runtime.Object
- func (l *AuthBackendRoleSecretIDList) GetItems() []resource.Managed
- type AuthBackendRoleSecretIDObservation
- type AuthBackendRoleSecretIDParameters
- type AuthBackendRoleSecretIDSpec
- type AuthBackendRoleSecretIDStatus
- type AuthBackendRoleSpec
- type AuthBackendRoleStatus
Constants ¶
const ( CRDGroup = "approle.vault.upbound.io" CRDVersion = "v1alpha1" )
Package type metadata.
Variables ¶
var ( AuthBackendLogin_Kind = "AuthBackendLogin" AuthBackendLogin_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: AuthBackendLogin_Kind}.String() AuthBackendLogin_KindAPIVersion = AuthBackendLogin_Kind + "." + CRDGroupVersion.String() AuthBackendLogin_GroupVersionKind = CRDGroupVersion.WithKind(AuthBackendLogin_Kind) )
Repository type metadata.
var ( AuthBackendRole_Kind = "AuthBackendRole" AuthBackendRole_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: AuthBackendRole_Kind}.String() AuthBackendRole_KindAPIVersion = AuthBackendRole_Kind + "." + CRDGroupVersion.String() AuthBackendRole_GroupVersionKind = CRDGroupVersion.WithKind(AuthBackendRole_Kind) )
Repository type metadata.
var ( AuthBackendRoleSecretID_Kind = "AuthBackendRoleSecretID" AuthBackendRoleSecretID_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: AuthBackendRoleSecretID_Kind}.String() AuthBackendRoleSecretID_KindAPIVersion = AuthBackendRoleSecretID_Kind + "." + CRDGroupVersion.String() AuthBackendRoleSecretID_GroupVersionKind = CRDGroupVersion.WithKind(AuthBackendRoleSecretID_Kind) )
Repository type metadata.
var ( // CRDGroupVersion is the API Group Version used to register the objects CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion} // SchemeBuilder is used to add go types to the GroupVersionKind scheme SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion} // AddToScheme adds the types in this group-version to the given scheme. AddToScheme = SchemeBuilder.AddToScheme )
Functions ¶
This section is empty.
Types ¶
type AuthBackendLogin ¶
type AuthBackendLogin struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.roleId) || has(self.initProvider.roleId)",message="roleId is a required parameter" Spec AuthBackendLoginSpec `json:"spec"` Status AuthBackendLoginStatus `json:"status,omitempty"` }
AuthBackendLogin is the Schema for the AuthBackendLogins API. Log into Vault using the AppRole auth backend. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
func (*AuthBackendLogin) DeepCopy ¶
func (in *AuthBackendLogin) DeepCopy() *AuthBackendLogin
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLogin.
func (*AuthBackendLogin) DeepCopyInto ¶
func (in *AuthBackendLogin) DeepCopyInto(out *AuthBackendLogin)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*AuthBackendLogin) DeepCopyObject ¶
func (in *AuthBackendLogin) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*AuthBackendLogin) GetCondition ¶
func (mg *AuthBackendLogin) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this AuthBackendLogin.
func (*AuthBackendLogin) GetConnectionDetailsMapping ¶
func (tr *AuthBackendLogin) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this AuthBackendLogin
func (*AuthBackendLogin) GetDeletionPolicy ¶
func (mg *AuthBackendLogin) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this AuthBackendLogin.
func (*AuthBackendLogin) GetID ¶
func (tr *AuthBackendLogin) GetID() string
GetID returns ID of underlying Terraform resource of this AuthBackendLogin
func (*AuthBackendLogin) GetInitParameters ¶ added in v0.2.0
func (tr *AuthBackendLogin) GetInitParameters() (map[string]any, error)
GetInitParameters of this AuthBackendLogin
func (*AuthBackendLogin) GetManagementPolicies ¶ added in v0.2.0
func (mg *AuthBackendLogin) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this AuthBackendLogin.
func (*AuthBackendLogin) GetObservation ¶
func (tr *AuthBackendLogin) GetObservation() (map[string]any, error)
GetObservation of this AuthBackendLogin
func (*AuthBackendLogin) GetParameters ¶
func (tr *AuthBackendLogin) GetParameters() (map[string]any, error)
GetParameters of this AuthBackendLogin
func (*AuthBackendLogin) GetProviderConfigReference ¶
func (mg *AuthBackendLogin) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this AuthBackendLogin.
func (*AuthBackendLogin) GetProviderReference ¶
func (mg *AuthBackendLogin) GetProviderReference() *xpv1.Reference
GetProviderReference of this AuthBackendLogin. Deprecated: Use GetProviderConfigReference.
func (*AuthBackendLogin) GetPublishConnectionDetailsTo ¶
func (mg *AuthBackendLogin) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this AuthBackendLogin.
func (*AuthBackendLogin) GetTerraformResourceType ¶
func (mg *AuthBackendLogin) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this AuthBackendLogin
func (*AuthBackendLogin) GetTerraformSchemaVersion ¶
func (tr *AuthBackendLogin) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*AuthBackendLogin) GetWriteConnectionSecretToReference ¶
func (mg *AuthBackendLogin) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this AuthBackendLogin.
func (*AuthBackendLogin) LateInitialize ¶
func (tr *AuthBackendLogin) LateInitialize(attrs []byte) (bool, error)
LateInitialize this AuthBackendLogin using its observed tfState. returns True if there are any spec changes for the resource.
func (*AuthBackendLogin) SetConditions ¶
func (mg *AuthBackendLogin) SetConditions(c ...xpv1.Condition)
SetConditions of this AuthBackendLogin.
func (*AuthBackendLogin) SetDeletionPolicy ¶
func (mg *AuthBackendLogin) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this AuthBackendLogin.
func (*AuthBackendLogin) SetManagementPolicies ¶ added in v0.2.0
func (mg *AuthBackendLogin) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this AuthBackendLogin.
func (*AuthBackendLogin) SetObservation ¶
func (tr *AuthBackendLogin) SetObservation(obs map[string]any) error
SetObservation for this AuthBackendLogin
func (*AuthBackendLogin) SetParameters ¶
func (tr *AuthBackendLogin) SetParameters(params map[string]any) error
SetParameters for this AuthBackendLogin
func (*AuthBackendLogin) SetProviderConfigReference ¶
func (mg *AuthBackendLogin) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this AuthBackendLogin.
func (*AuthBackendLogin) SetProviderReference ¶
func (mg *AuthBackendLogin) SetProviderReference(r *xpv1.Reference)
SetProviderReference of this AuthBackendLogin. Deprecated: Use SetProviderConfigReference.
func (*AuthBackendLogin) SetPublishConnectionDetailsTo ¶
func (mg *AuthBackendLogin) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this AuthBackendLogin.
func (*AuthBackendLogin) SetWriteConnectionSecretToReference ¶
func (mg *AuthBackendLogin) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this AuthBackendLogin.
type AuthBackendLoginInitParameters ¶ added in v0.2.0
type AuthBackendLoginInitParameters struct { // The unique path of the Vault backend to log in with. // Unique name of the auth backend to configure. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The ID of the role to log in with. // The RoleID to log in with. RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"` }
func (*AuthBackendLoginInitParameters) DeepCopy ¶ added in v0.2.0
func (in *AuthBackendLoginInitParameters) DeepCopy() *AuthBackendLoginInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginInitParameters.
func (*AuthBackendLoginInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *AuthBackendLoginInitParameters) DeepCopyInto(out *AuthBackendLoginInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendLoginList ¶
type AuthBackendLoginList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []AuthBackendLogin `json:"items"` }
AuthBackendLoginList contains a list of AuthBackendLogins
func (*AuthBackendLoginList) DeepCopy ¶
func (in *AuthBackendLoginList) DeepCopy() *AuthBackendLoginList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginList.
func (*AuthBackendLoginList) DeepCopyInto ¶
func (in *AuthBackendLoginList) DeepCopyInto(out *AuthBackendLoginList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*AuthBackendLoginList) DeepCopyObject ¶
func (in *AuthBackendLoginList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*AuthBackendLoginList) GetItems ¶
func (l *AuthBackendLoginList) GetItems() []resource.Managed
GetItems of this AuthBackendLoginList.
type AuthBackendLoginObservation ¶
type AuthBackendLoginObservation struct { // The accessor for the token. // The accessor for the token. Accessor *string `json:"accessor,omitempty" tf:"accessor,omitempty"` // The unique path of the Vault backend to log in with. // Unique name of the auth backend to configure. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` ID *string `json:"id,omitempty" tf:"id,omitempty"` // How long the token is valid for, in seconds. // How long the token is valid for. LeaseDuration *float64 `json:"leaseDuration,omitempty" tf:"lease_duration,omitempty"` // The date and time the lease started, in RFC 3339 format. LeaseStarted *string `json:"leaseStarted,omitempty" tf:"lease_started,omitempty"` // The metadata associated with the token. // Metadata associated with the token. Metadata map[string]*string `json:"metadata,omitempty" tf:"metadata,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // A list of policies applied to the token. // Policies set on the token. Policies []*string `json:"policies,omitempty" tf:"policies,omitempty"` // Whether the token is renewable or not. // Whether the token is renewable or not. Renewable *bool `json:"renewable,omitempty" tf:"renewable,omitempty"` // The ID of the role to log in with. // The RoleID to log in with. RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"` }
func (*AuthBackendLoginObservation) DeepCopy ¶
func (in *AuthBackendLoginObservation) DeepCopy() *AuthBackendLoginObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginObservation.
func (*AuthBackendLoginObservation) DeepCopyInto ¶
func (in *AuthBackendLoginObservation) DeepCopyInto(out *AuthBackendLoginObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendLoginParameters ¶
type AuthBackendLoginParameters struct { // The unique path of the Vault backend to log in with. // Unique name of the auth backend to configure. // +kubebuilder:validation:Optional Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) // +kubebuilder:validation:Optional Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The ID of the role to log in with. // The RoleID to log in with. // +kubebuilder:validation:Optional RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"` // The secret ID of the role to log in with. Required // unless bind_secret_id is set to false on the role. // The SecretID to log in with. // +kubebuilder:validation:Optional SecretIDSecretRef *v1.SecretKeySelector `json:"secretIdSecretRef,omitempty" tf:"-"` }
func (*AuthBackendLoginParameters) DeepCopy ¶
func (in *AuthBackendLoginParameters) DeepCopy() *AuthBackendLoginParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginParameters.
func (*AuthBackendLoginParameters) DeepCopyInto ¶
func (in *AuthBackendLoginParameters) DeepCopyInto(out *AuthBackendLoginParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendLoginSpec ¶
type AuthBackendLoginSpec struct { v1.ResourceSpec `json:",inline"` ForProvider AuthBackendLoginParameters `json:"forProvider"` // THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored // unless the relevant Crossplane feature flag is enabled, and may be // changed or removed without notice. // InitProvider holds the same fields as ForProvider, with the exception // of Identifier and other resource reference fields. The fields that are // in InitProvider are merged into ForProvider when the resource is created. // The same fields are also added to the terraform ignore_changes hook, to // avoid updating them after creation. This is useful for fields that are // required on creation, but we do not desire to update them after creation, // for example because of an external controller is managing them, like an // autoscaler. InitProvider AuthBackendLoginInitParameters `json:"initProvider,omitempty"` }
AuthBackendLoginSpec defines the desired state of AuthBackendLogin
func (*AuthBackendLoginSpec) DeepCopy ¶
func (in *AuthBackendLoginSpec) DeepCopy() *AuthBackendLoginSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginSpec.
func (*AuthBackendLoginSpec) DeepCopyInto ¶
func (in *AuthBackendLoginSpec) DeepCopyInto(out *AuthBackendLoginSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendLoginStatus ¶
type AuthBackendLoginStatus struct { v1.ResourceStatus `json:",inline"` AtProvider AuthBackendLoginObservation `json:"atProvider,omitempty"` }
AuthBackendLoginStatus defines the observed state of AuthBackendLogin.
func (*AuthBackendLoginStatus) DeepCopy ¶
func (in *AuthBackendLoginStatus) DeepCopy() *AuthBackendLoginStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginStatus.
func (*AuthBackendLoginStatus) DeepCopyInto ¶
func (in *AuthBackendLoginStatus) DeepCopyInto(out *AuthBackendLoginStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRole ¶
type AuthBackendRole struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.roleName) || has(self.initProvider.roleName)",message="roleName is a required parameter" Spec AuthBackendRoleSpec `json:"spec"` Status AuthBackendRoleStatus `json:"status,omitempty"` }
AuthBackendRole is the Schema for the AuthBackendRoles API. Manages AppRole auth backend roles in Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
func (*AuthBackendRole) DeepCopy ¶
func (in *AuthBackendRole) DeepCopy() *AuthBackendRole
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRole.
func (*AuthBackendRole) DeepCopyInto ¶
func (in *AuthBackendRole) DeepCopyInto(out *AuthBackendRole)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*AuthBackendRole) DeepCopyObject ¶
func (in *AuthBackendRole) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*AuthBackendRole) GetCondition ¶
func (mg *AuthBackendRole) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this AuthBackendRole.
func (*AuthBackendRole) GetConnectionDetailsMapping ¶
func (tr *AuthBackendRole) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this AuthBackendRole
func (*AuthBackendRole) GetDeletionPolicy ¶
func (mg *AuthBackendRole) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this AuthBackendRole.
func (*AuthBackendRole) GetID ¶
func (tr *AuthBackendRole) GetID() string
GetID returns ID of underlying Terraform resource of this AuthBackendRole
func (*AuthBackendRole) GetInitParameters ¶ added in v0.2.0
func (tr *AuthBackendRole) GetInitParameters() (map[string]any, error)
GetInitParameters of this AuthBackendRole
func (*AuthBackendRole) GetManagementPolicies ¶ added in v0.2.0
func (mg *AuthBackendRole) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this AuthBackendRole.
func (*AuthBackendRole) GetObservation ¶
func (tr *AuthBackendRole) GetObservation() (map[string]any, error)
GetObservation of this AuthBackendRole
func (*AuthBackendRole) GetParameters ¶
func (tr *AuthBackendRole) GetParameters() (map[string]any, error)
GetParameters of this AuthBackendRole
func (*AuthBackendRole) GetProviderConfigReference ¶
func (mg *AuthBackendRole) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this AuthBackendRole.
func (*AuthBackendRole) GetProviderReference ¶
func (mg *AuthBackendRole) GetProviderReference() *xpv1.Reference
GetProviderReference of this AuthBackendRole. Deprecated: Use GetProviderConfigReference.
func (*AuthBackendRole) GetPublishConnectionDetailsTo ¶
func (mg *AuthBackendRole) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this AuthBackendRole.
func (*AuthBackendRole) GetTerraformResourceType ¶
func (mg *AuthBackendRole) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this AuthBackendRole
func (*AuthBackendRole) GetTerraformSchemaVersion ¶
func (tr *AuthBackendRole) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*AuthBackendRole) GetWriteConnectionSecretToReference ¶
func (mg *AuthBackendRole) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this AuthBackendRole.
func (*AuthBackendRole) LateInitialize ¶
func (tr *AuthBackendRole) LateInitialize(attrs []byte) (bool, error)
LateInitialize this AuthBackendRole using its observed tfState. returns True if there are any spec changes for the resource.
func (*AuthBackendRole) SetConditions ¶
func (mg *AuthBackendRole) SetConditions(c ...xpv1.Condition)
SetConditions of this AuthBackendRole.
func (*AuthBackendRole) SetDeletionPolicy ¶
func (mg *AuthBackendRole) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this AuthBackendRole.
func (*AuthBackendRole) SetManagementPolicies ¶ added in v0.2.0
func (mg *AuthBackendRole) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this AuthBackendRole.
func (*AuthBackendRole) SetObservation ¶
func (tr *AuthBackendRole) SetObservation(obs map[string]any) error
SetObservation for this AuthBackendRole
func (*AuthBackendRole) SetParameters ¶
func (tr *AuthBackendRole) SetParameters(params map[string]any) error
SetParameters for this AuthBackendRole
func (*AuthBackendRole) SetProviderConfigReference ¶
func (mg *AuthBackendRole) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this AuthBackendRole.
func (*AuthBackendRole) SetProviderReference ¶
func (mg *AuthBackendRole) SetProviderReference(r *xpv1.Reference)
SetProviderReference of this AuthBackendRole. Deprecated: Use SetProviderConfigReference.
func (*AuthBackendRole) SetPublishConnectionDetailsTo ¶
func (mg *AuthBackendRole) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this AuthBackendRole.
func (*AuthBackendRole) SetWriteConnectionSecretToReference ¶
func (mg *AuthBackendRole) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this AuthBackendRole.
type AuthBackendRoleInitParameters ¶ added in v0.2.0
type AuthBackendRoleInitParameters struct { // The unique name of the auth backend to configure. // Defaults to approle. // Unique name of the auth backend to configure. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // Whether or not to require secret_id to be // presented when logging in using this AppRole. Defaults to true. // Whether or not to require secret_id to be present when logging in using this AppRole. BindSecretID *bool `json:"bindSecretId,omitempty" tf:"bind_secret_id,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The RoleID of this role. If not specified, one will be // auto-generated. // The RoleID of the role. Autogenerated if not set. RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"` // The name of the role. // Name of the role. RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"` // If set, // specifies blocks of IP addresses which can perform the login operation. // List of CIDR blocks that can log in using the AppRole. SecretIDBoundCidrs []*string `json:"secretIdBoundCidrs,omitempty" tf:"secret_id_bound_cidrs,omitempty"` // The number of times any particular SecretID // can be used to fetch a token from this AppRole, after which the SecretID will // expire. A value of zero will allow unlimited uses. // Number of times which a particular SecretID can be used to fetch a token from this AppRole, after which the SecretID will expire. Leaving this unset or setting it to 0 will allow unlimited uses. SecretIDNumUses *float64 `json:"secretIdNumUses,omitempty" tf:"secret_id_num_uses,omitempty"` // The number of seconds after which any SecretID // expires. // Number of seconds a SecretID remains valid for. SecretIDTTL *float64 `json:"secretIdTtl,omitempty" tf:"secret_id_ttl,omitempty"` // List of CIDR blocks; if set, specifies blocks of IP // addresses which can authenticate successfully, and ties the resulting token to these blocks // as well. // Specifies the blocks of IP addresses which are allowed to use the generated token TokenBoundCidrs []*string `json:"tokenBoundCidrs,omitempty" tf:"token_bound_cidrs,omitempty"` // If set, will encode an // explicit max TTL // onto the token in number of seconds. This is a hard cap even if token_ttl and // token_max_ttl would otherwise allow a renewal. // Generated Token's Explicit Maximum TTL in seconds TokenExplicitMaxTTL *float64 `json:"tokenExplicitMaxTtl,omitempty" tf:"token_explicit_max_ttl,omitempty"` // The maximum lifetime for generated tokens in number of seconds. // Its current value will be referenced at renewal time. // The maximum lifetime of the generated token TokenMaxTTL *float64 `json:"tokenMaxTtl,omitempty" tf:"token_max_ttl,omitempty"` // If set, the default policy will not be set on // generated tokens; otherwise it will be added to the policies set in token_policies. // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy *bool `json:"tokenNoDefaultPolicy,omitempty" tf:"token_no_default_policy,omitempty"` // The maximum number // of times a generated token may be used (within its lifetime); 0 means unlimited. // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses *float64 `json:"tokenNumUses,omitempty" tf:"token_num_uses,omitempty"` // If set, indicates that the // token generated using this role should never expire. The token should be renewed within the // duration specified by this value. At each renewal, the token's TTL will be set to the // value of this field. Specified in seconds. // Generated Token's Period TokenPeriod *float64 `json:"tokenPeriod,omitempty" tf:"token_period,omitempty"` // List of policies to encode onto generated tokens. Depending // on the auth method, this list may be supplemented by user/group/other values. // Generated Token's Policies TokenPolicies []*string `json:"tokenPolicies,omitempty" tf:"token_policies,omitempty"` // The incremental lifetime for generated tokens in number of seconds. // Its current value will be referenced at renewal time. // The initial ttl of the token to generate in seconds TokenTTL *float64 `json:"tokenTtl,omitempty" tf:"token_ttl,omitempty"` // The type of token that should be generated. Can be service, // batch, or default to use the mount's tuned default (which unless changed will be // service tokens). For token store roles, there are two additional possibilities: // default-service and default-batch which specify the type to return unless the client // requests a different type at generation time. // The type of token to generate, service or batch TokenType *string `json:"tokenType,omitempty" tf:"token_type,omitempty"` }
func (*AuthBackendRoleInitParameters) DeepCopy ¶ added in v0.2.0
func (in *AuthBackendRoleInitParameters) DeepCopy() *AuthBackendRoleInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleInitParameters.
func (*AuthBackendRoleInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *AuthBackendRoleInitParameters) DeepCopyInto(out *AuthBackendRoleInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRoleList ¶
type AuthBackendRoleList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []AuthBackendRole `json:"items"` }
AuthBackendRoleList contains a list of AuthBackendRoles
func (*AuthBackendRoleList) DeepCopy ¶
func (in *AuthBackendRoleList) DeepCopy() *AuthBackendRoleList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleList.
func (*AuthBackendRoleList) DeepCopyInto ¶
func (in *AuthBackendRoleList) DeepCopyInto(out *AuthBackendRoleList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*AuthBackendRoleList) DeepCopyObject ¶
func (in *AuthBackendRoleList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*AuthBackendRoleList) GetItems ¶
func (l *AuthBackendRoleList) GetItems() []resource.Managed
GetItems of this AuthBackendRoleList.
type AuthBackendRoleObservation ¶
type AuthBackendRoleObservation struct { // The unique name of the auth backend to configure. // Defaults to approle. // Unique name of the auth backend to configure. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // Whether or not to require secret_id to be // presented when logging in using this AppRole. Defaults to true. // Whether or not to require secret_id to be present when logging in using this AppRole. BindSecretID *bool `json:"bindSecretId,omitempty" tf:"bind_secret_id,omitempty"` ID *string `json:"id,omitempty" tf:"id,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The RoleID of this role. If not specified, one will be // auto-generated. // The RoleID of the role. Autogenerated if not set. RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"` // The name of the role. // Name of the role. RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"` // If set, // specifies blocks of IP addresses which can perform the login operation. // List of CIDR blocks that can log in using the AppRole. SecretIDBoundCidrs []*string `json:"secretIdBoundCidrs,omitempty" tf:"secret_id_bound_cidrs,omitempty"` // The number of times any particular SecretID // can be used to fetch a token from this AppRole, after which the SecretID will // expire. A value of zero will allow unlimited uses. // Number of times which a particular SecretID can be used to fetch a token from this AppRole, after which the SecretID will expire. Leaving this unset or setting it to 0 will allow unlimited uses. SecretIDNumUses *float64 `json:"secretIdNumUses,omitempty" tf:"secret_id_num_uses,omitempty"` // The number of seconds after which any SecretID // expires. // Number of seconds a SecretID remains valid for. SecretIDTTL *float64 `json:"secretIdTtl,omitempty" tf:"secret_id_ttl,omitempty"` // List of CIDR blocks; if set, specifies blocks of IP // addresses which can authenticate successfully, and ties the resulting token to these blocks // as well. // Specifies the blocks of IP addresses which are allowed to use the generated token TokenBoundCidrs []*string `json:"tokenBoundCidrs,omitempty" tf:"token_bound_cidrs,omitempty"` // If set, will encode an // explicit max TTL // onto the token in number of seconds. This is a hard cap even if token_ttl and // token_max_ttl would otherwise allow a renewal. // Generated Token's Explicit Maximum TTL in seconds TokenExplicitMaxTTL *float64 `json:"tokenExplicitMaxTtl,omitempty" tf:"token_explicit_max_ttl,omitempty"` // The maximum lifetime for generated tokens in number of seconds. // Its current value will be referenced at renewal time. // The maximum lifetime of the generated token TokenMaxTTL *float64 `json:"tokenMaxTtl,omitempty" tf:"token_max_ttl,omitempty"` // If set, the default policy will not be set on // generated tokens; otherwise it will be added to the policies set in token_policies. // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy *bool `json:"tokenNoDefaultPolicy,omitempty" tf:"token_no_default_policy,omitempty"` // The maximum number // of times a generated token may be used (within its lifetime); 0 means unlimited. // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses *float64 `json:"tokenNumUses,omitempty" tf:"token_num_uses,omitempty"` // If set, indicates that the // token generated using this role should never expire. The token should be renewed within the // duration specified by this value. At each renewal, the token's TTL will be set to the // value of this field. Specified in seconds. // Generated Token's Period TokenPeriod *float64 `json:"tokenPeriod,omitempty" tf:"token_period,omitempty"` // List of policies to encode onto generated tokens. Depending // on the auth method, this list may be supplemented by user/group/other values. // Generated Token's Policies TokenPolicies []*string `json:"tokenPolicies,omitempty" tf:"token_policies,omitempty"` // The incremental lifetime for generated tokens in number of seconds. // Its current value will be referenced at renewal time. // The initial ttl of the token to generate in seconds TokenTTL *float64 `json:"tokenTtl,omitempty" tf:"token_ttl,omitempty"` // The type of token that should be generated. Can be service, // batch, or default to use the mount's tuned default (which unless changed will be // service tokens). For token store roles, there are two additional possibilities: // default-service and default-batch which specify the type to return unless the client // requests a different type at generation time. // The type of token to generate, service or batch TokenType *string `json:"tokenType,omitempty" tf:"token_type,omitempty"` }
func (*AuthBackendRoleObservation) DeepCopy ¶
func (in *AuthBackendRoleObservation) DeepCopy() *AuthBackendRoleObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleObservation.
func (*AuthBackendRoleObservation) DeepCopyInto ¶
func (in *AuthBackendRoleObservation) DeepCopyInto(out *AuthBackendRoleObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRoleParameters ¶
type AuthBackendRoleParameters struct { // The unique name of the auth backend to configure. // Defaults to approle. // Unique name of the auth backend to configure. // +kubebuilder:validation:Optional Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // Whether or not to require secret_id to be // presented when logging in using this AppRole. Defaults to true. // Whether or not to require secret_id to be present when logging in using this AppRole. // +kubebuilder:validation:Optional BindSecretID *bool `json:"bindSecretId,omitempty" tf:"bind_secret_id,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) // +kubebuilder:validation:Optional Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The RoleID of this role. If not specified, one will be // auto-generated. // The RoleID of the role. Autogenerated if not set. // +kubebuilder:validation:Optional RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"` // The name of the role. // Name of the role. // +kubebuilder:validation:Optional RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"` // If set, // specifies blocks of IP addresses which can perform the login operation. // List of CIDR blocks that can log in using the AppRole. // +kubebuilder:validation:Optional SecretIDBoundCidrs []*string `json:"secretIdBoundCidrs,omitempty" tf:"secret_id_bound_cidrs,omitempty"` // The number of times any particular SecretID // can be used to fetch a token from this AppRole, after which the SecretID will // expire. A value of zero will allow unlimited uses. // Number of times which a particular SecretID can be used to fetch a token from this AppRole, after which the SecretID will expire. Leaving this unset or setting it to 0 will allow unlimited uses. // +kubebuilder:validation:Optional SecretIDNumUses *float64 `json:"secretIdNumUses,omitempty" tf:"secret_id_num_uses,omitempty"` // The number of seconds after which any SecretID // expires. // Number of seconds a SecretID remains valid for. // +kubebuilder:validation:Optional SecretIDTTL *float64 `json:"secretIdTtl,omitempty" tf:"secret_id_ttl,omitempty"` // List of CIDR blocks; if set, specifies blocks of IP // addresses which can authenticate successfully, and ties the resulting token to these blocks // as well. // Specifies the blocks of IP addresses which are allowed to use the generated token // +kubebuilder:validation:Optional TokenBoundCidrs []*string `json:"tokenBoundCidrs,omitempty" tf:"token_bound_cidrs,omitempty"` // If set, will encode an // explicit max TTL // onto the token in number of seconds. This is a hard cap even if token_ttl and // token_max_ttl would otherwise allow a renewal. // Generated Token's Explicit Maximum TTL in seconds // +kubebuilder:validation:Optional TokenExplicitMaxTTL *float64 `json:"tokenExplicitMaxTtl,omitempty" tf:"token_explicit_max_ttl,omitempty"` // The maximum lifetime for generated tokens in number of seconds. // Its current value will be referenced at renewal time. // The maximum lifetime of the generated token // +kubebuilder:validation:Optional TokenMaxTTL *float64 `json:"tokenMaxTtl,omitempty" tf:"token_max_ttl,omitempty"` // If set, the default policy will not be set on // generated tokens; otherwise it will be added to the policies set in token_policies. // If true, the 'default' policy will not automatically be added to generated tokens // +kubebuilder:validation:Optional TokenNoDefaultPolicy *bool `json:"tokenNoDefaultPolicy,omitempty" tf:"token_no_default_policy,omitempty"` // The maximum number // of times a generated token may be used (within its lifetime); 0 means unlimited. // The maximum number of times a token may be used, a value of zero means unlimited // +kubebuilder:validation:Optional TokenNumUses *float64 `json:"tokenNumUses,omitempty" tf:"token_num_uses,omitempty"` // If set, indicates that the // token generated using this role should never expire. The token should be renewed within the // duration specified by this value. At each renewal, the token's TTL will be set to the // value of this field. Specified in seconds. // Generated Token's Period // +kubebuilder:validation:Optional TokenPeriod *float64 `json:"tokenPeriod,omitempty" tf:"token_period,omitempty"` // List of policies to encode onto generated tokens. Depending // on the auth method, this list may be supplemented by user/group/other values. // Generated Token's Policies // +kubebuilder:validation:Optional TokenPolicies []*string `json:"tokenPolicies,omitempty" tf:"token_policies,omitempty"` // The incremental lifetime for generated tokens in number of seconds. // Its current value will be referenced at renewal time. // The initial ttl of the token to generate in seconds // +kubebuilder:validation:Optional TokenTTL *float64 `json:"tokenTtl,omitempty" tf:"token_ttl,omitempty"` // The type of token that should be generated. Can be service, // batch, or default to use the mount's tuned default (which unless changed will be // service tokens). For token store roles, there are two additional possibilities: // default-service and default-batch which specify the type to return unless the client // requests a different type at generation time. // The type of token to generate, service or batch // +kubebuilder:validation:Optional TokenType *string `json:"tokenType,omitempty" tf:"token_type,omitempty"` }
func (*AuthBackendRoleParameters) DeepCopy ¶
func (in *AuthBackendRoleParameters) DeepCopy() *AuthBackendRoleParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleParameters.
func (*AuthBackendRoleParameters) DeepCopyInto ¶
func (in *AuthBackendRoleParameters) DeepCopyInto(out *AuthBackendRoleParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRoleSecretID ¶
type AuthBackendRoleSecretID struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.roleName) || has(self.initProvider.roleName)",message="roleName is a required parameter" Spec AuthBackendRoleSecretIDSpec `json:"spec"` Status AuthBackendRoleSecretIDStatus `json:"status,omitempty"` }
AuthBackendRoleSecretID is the Schema for the AuthBackendRoleSecretIDs API. Manages AppRole auth backend role SecretIDs in Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
func (*AuthBackendRoleSecretID) DeepCopy ¶
func (in *AuthBackendRoleSecretID) DeepCopy() *AuthBackendRoleSecretID
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) DeepCopyInto ¶
func (in *AuthBackendRoleSecretID) DeepCopyInto(out *AuthBackendRoleSecretID)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*AuthBackendRoleSecretID) DeepCopyObject ¶
func (in *AuthBackendRoleSecretID) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*AuthBackendRoleSecretID) GetCondition ¶
func (mg *AuthBackendRoleSecretID) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) GetConnectionDetailsMapping ¶
func (tr *AuthBackendRoleSecretID) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this AuthBackendRoleSecretID
func (*AuthBackendRoleSecretID) GetDeletionPolicy ¶
func (mg *AuthBackendRoleSecretID) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) GetID ¶
func (tr *AuthBackendRoleSecretID) GetID() string
GetID returns ID of underlying Terraform resource of this AuthBackendRoleSecretID
func (*AuthBackendRoleSecretID) GetInitParameters ¶ added in v0.2.0
func (tr *AuthBackendRoleSecretID) GetInitParameters() (map[string]any, error)
GetInitParameters of this AuthBackendRoleSecretID
func (*AuthBackendRoleSecretID) GetManagementPolicies ¶ added in v0.2.0
func (mg *AuthBackendRoleSecretID) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) GetObservation ¶
func (tr *AuthBackendRoleSecretID) GetObservation() (map[string]any, error)
GetObservation of this AuthBackendRoleSecretID
func (*AuthBackendRoleSecretID) GetParameters ¶
func (tr *AuthBackendRoleSecretID) GetParameters() (map[string]any, error)
GetParameters of this AuthBackendRoleSecretID
func (*AuthBackendRoleSecretID) GetProviderConfigReference ¶
func (mg *AuthBackendRoleSecretID) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) GetProviderReference ¶
func (mg *AuthBackendRoleSecretID) GetProviderReference() *xpv1.Reference
GetProviderReference of this AuthBackendRoleSecretID. Deprecated: Use GetProviderConfigReference.
func (*AuthBackendRoleSecretID) GetPublishConnectionDetailsTo ¶
func (mg *AuthBackendRoleSecretID) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) GetTerraformResourceType ¶
func (mg *AuthBackendRoleSecretID) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this AuthBackendRoleSecretID
func (*AuthBackendRoleSecretID) GetTerraformSchemaVersion ¶
func (tr *AuthBackendRoleSecretID) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*AuthBackendRoleSecretID) GetWriteConnectionSecretToReference ¶
func (mg *AuthBackendRoleSecretID) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) LateInitialize ¶
func (tr *AuthBackendRoleSecretID) LateInitialize(attrs []byte) (bool, error)
LateInitialize this AuthBackendRoleSecretID using its observed tfState. returns True if there are any spec changes for the resource.
func (*AuthBackendRoleSecretID) SetConditions ¶
func (mg *AuthBackendRoleSecretID) SetConditions(c ...xpv1.Condition)
SetConditions of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) SetDeletionPolicy ¶
func (mg *AuthBackendRoleSecretID) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) SetManagementPolicies ¶ added in v0.2.0
func (mg *AuthBackendRoleSecretID) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) SetObservation ¶
func (tr *AuthBackendRoleSecretID) SetObservation(obs map[string]any) error
SetObservation for this AuthBackendRoleSecretID
func (*AuthBackendRoleSecretID) SetParameters ¶
func (tr *AuthBackendRoleSecretID) SetParameters(params map[string]any) error
SetParameters for this AuthBackendRoleSecretID
func (*AuthBackendRoleSecretID) SetProviderConfigReference ¶
func (mg *AuthBackendRoleSecretID) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) SetProviderReference ¶
func (mg *AuthBackendRoleSecretID) SetProviderReference(r *xpv1.Reference)
SetProviderReference of this AuthBackendRoleSecretID. Deprecated: Use SetProviderConfigReference.
func (*AuthBackendRoleSecretID) SetPublishConnectionDetailsTo ¶
func (mg *AuthBackendRoleSecretID) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretID) SetWriteConnectionSecretToReference ¶
func (mg *AuthBackendRoleSecretID) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this AuthBackendRoleSecretID.
type AuthBackendRoleSecretIDInitParameters ¶ added in v0.2.0
type AuthBackendRoleSecretIDInitParameters struct { // Unique name of the auth backend to configure. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // If set, specifies blocks of IP addresses which can // perform the login operation using this SecretID. // List of CIDR blocks that can log in using the SecretID. CidrList []*string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"` // A JSON-encoded string containing metadata in // key-value pairs to be set on tokens issued with this SecretID. // JSON-encoded secret data to write. Metadata *string `json:"metadata,omitempty" tf:"metadata,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The name of the role to create the SecretID for. // Name of the role. RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"` // Set to true to use the wrapped secret-id accessor as the resource ID. // If false (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or // invalidated through unwrapping. // Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. WithWrappedAccessor *bool `json:"withWrappedAccessor,omitempty" tf:"with_wrapped_accessor,omitempty"` // If set, the SecretID response will be // response-wrapped // and available for the duration specified. Only a single unwrapping of the // token is allowed. // The TTL duration of the wrapped SecretID. WrappingTTL *string `json:"wrappingTtl,omitempty" tf:"wrapping_ttl,omitempty"` }
func (*AuthBackendRoleSecretIDInitParameters) DeepCopy ¶ added in v0.2.0
func (in *AuthBackendRoleSecretIDInitParameters) DeepCopy() *AuthBackendRoleSecretIDInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDInitParameters.
func (*AuthBackendRoleSecretIDInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *AuthBackendRoleSecretIDInitParameters) DeepCopyInto(out *AuthBackendRoleSecretIDInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRoleSecretIDList ¶
type AuthBackendRoleSecretIDList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []AuthBackendRoleSecretID `json:"items"` }
AuthBackendRoleSecretIDList contains a list of AuthBackendRoleSecretIDs
func (*AuthBackendRoleSecretIDList) DeepCopy ¶
func (in *AuthBackendRoleSecretIDList) DeepCopy() *AuthBackendRoleSecretIDList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDList.
func (*AuthBackendRoleSecretIDList) DeepCopyInto ¶
func (in *AuthBackendRoleSecretIDList) DeepCopyInto(out *AuthBackendRoleSecretIDList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*AuthBackendRoleSecretIDList) DeepCopyObject ¶
func (in *AuthBackendRoleSecretIDList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*AuthBackendRoleSecretIDList) GetItems ¶
func (l *AuthBackendRoleSecretIDList) GetItems() []resource.Managed
GetItems of this AuthBackendRoleSecretIDList.
type AuthBackendRoleSecretIDObservation ¶
type AuthBackendRoleSecretIDObservation struct { // The unique ID for this SecretID that can be safely logged. // The unique ID used to access this SecretID. Accessor *string `json:"accessor,omitempty" tf:"accessor,omitempty"` // Unique name of the auth backend to configure. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // If set, specifies blocks of IP addresses which can // perform the login operation using this SecretID. // List of CIDR blocks that can log in using the SecretID. CidrList []*string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"` ID *string `json:"id,omitempty" tf:"id,omitempty"` // A JSON-encoded string containing metadata in // key-value pairs to be set on tokens issued with this SecretID. // JSON-encoded secret data to write. Metadata *string `json:"metadata,omitempty" tf:"metadata,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The name of the role to create the SecretID for. // Name of the role. RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"` // Set to true to use the wrapped secret-id accessor as the resource ID. // If false (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or // invalidated through unwrapping. // Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. WithWrappedAccessor *bool `json:"withWrappedAccessor,omitempty" tf:"with_wrapped_accessor,omitempty"` // The unique ID for the response-wrapped SecretID that can // be safely logged. // The wrapped SecretID accessor. WrappingAccessor *string `json:"wrappingAccessor,omitempty" tf:"wrapping_accessor,omitempty"` // If set, the SecretID response will be // response-wrapped // and available for the duration specified. Only a single unwrapping of the // token is allowed. // The TTL duration of the wrapped SecretID. WrappingTTL *string `json:"wrappingTtl,omitempty" tf:"wrapping_ttl,omitempty"` }
func (*AuthBackendRoleSecretIDObservation) DeepCopy ¶
func (in *AuthBackendRoleSecretIDObservation) DeepCopy() *AuthBackendRoleSecretIDObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDObservation.
func (*AuthBackendRoleSecretIDObservation) DeepCopyInto ¶
func (in *AuthBackendRoleSecretIDObservation) DeepCopyInto(out *AuthBackendRoleSecretIDObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRoleSecretIDParameters ¶
type AuthBackendRoleSecretIDParameters struct { // Unique name of the auth backend to configure. // +kubebuilder:validation:Optional Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // If set, specifies blocks of IP addresses which can // perform the login operation using this SecretID. // List of CIDR blocks that can log in using the SecretID. // +kubebuilder:validation:Optional CidrList []*string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"` // A JSON-encoded string containing metadata in // key-value pairs to be set on tokens issued with this SecretID. // JSON-encoded secret data to write. // +kubebuilder:validation:Optional Metadata *string `json:"metadata,omitempty" tf:"metadata,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) // +kubebuilder:validation:Optional Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The name of the role to create the SecretID for. // Name of the role. // +kubebuilder:validation:Optional RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"` // The SecretID to be created. If set, uses "Push" // mode. Defaults to Vault auto-generating SecretIDs. // The SecretID to be managed. If not specified, Vault auto-generates one. // +kubebuilder:validation:Optional SecretIDSecretRef *v1.SecretKeySelector `json:"secretIdSecretRef,omitempty" tf:"-"` // Set to true to use the wrapped secret-id accessor as the resource ID. // If false (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or // invalidated through unwrapping. // Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. // +kubebuilder:validation:Optional WithWrappedAccessor *bool `json:"withWrappedAccessor,omitempty" tf:"with_wrapped_accessor,omitempty"` // If set, the SecretID response will be // response-wrapped // and available for the duration specified. Only a single unwrapping of the // token is allowed. // The TTL duration of the wrapped SecretID. // +kubebuilder:validation:Optional WrappingTTL *string `json:"wrappingTtl,omitempty" tf:"wrapping_ttl,omitempty"` }
func (*AuthBackendRoleSecretIDParameters) DeepCopy ¶
func (in *AuthBackendRoleSecretIDParameters) DeepCopy() *AuthBackendRoleSecretIDParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDParameters.
func (*AuthBackendRoleSecretIDParameters) DeepCopyInto ¶
func (in *AuthBackendRoleSecretIDParameters) DeepCopyInto(out *AuthBackendRoleSecretIDParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRoleSecretIDSpec ¶
type AuthBackendRoleSecretIDSpec struct { v1.ResourceSpec `json:",inline"` ForProvider AuthBackendRoleSecretIDParameters `json:"forProvider"` // THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored // unless the relevant Crossplane feature flag is enabled, and may be // changed or removed without notice. // InitProvider holds the same fields as ForProvider, with the exception // of Identifier and other resource reference fields. The fields that are // in InitProvider are merged into ForProvider when the resource is created. // The same fields are also added to the terraform ignore_changes hook, to // avoid updating them after creation. This is useful for fields that are // required on creation, but we do not desire to update them after creation, // for example because of an external controller is managing them, like an // autoscaler. InitProvider AuthBackendRoleSecretIDInitParameters `json:"initProvider,omitempty"` }
AuthBackendRoleSecretIDSpec defines the desired state of AuthBackendRoleSecretID
func (*AuthBackendRoleSecretIDSpec) DeepCopy ¶
func (in *AuthBackendRoleSecretIDSpec) DeepCopy() *AuthBackendRoleSecretIDSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDSpec.
func (*AuthBackendRoleSecretIDSpec) DeepCopyInto ¶
func (in *AuthBackendRoleSecretIDSpec) DeepCopyInto(out *AuthBackendRoleSecretIDSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRoleSecretIDStatus ¶
type AuthBackendRoleSecretIDStatus struct { v1.ResourceStatus `json:",inline"` AtProvider AuthBackendRoleSecretIDObservation `json:"atProvider,omitempty"` }
AuthBackendRoleSecretIDStatus defines the observed state of AuthBackendRoleSecretID.
func (*AuthBackendRoleSecretIDStatus) DeepCopy ¶
func (in *AuthBackendRoleSecretIDStatus) DeepCopy() *AuthBackendRoleSecretIDStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDStatus.
func (*AuthBackendRoleSecretIDStatus) DeepCopyInto ¶
func (in *AuthBackendRoleSecretIDStatus) DeepCopyInto(out *AuthBackendRoleSecretIDStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRoleSpec ¶
type AuthBackendRoleSpec struct { v1.ResourceSpec `json:",inline"` ForProvider AuthBackendRoleParameters `json:"forProvider"` // THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored // unless the relevant Crossplane feature flag is enabled, and may be // changed or removed without notice. // InitProvider holds the same fields as ForProvider, with the exception // of Identifier and other resource reference fields. The fields that are // in InitProvider are merged into ForProvider when the resource is created. // The same fields are also added to the terraform ignore_changes hook, to // avoid updating them after creation. This is useful for fields that are // required on creation, but we do not desire to update them after creation, // for example because of an external controller is managing them, like an // autoscaler. InitProvider AuthBackendRoleInitParameters `json:"initProvider,omitempty"` }
AuthBackendRoleSpec defines the desired state of AuthBackendRole
func (*AuthBackendRoleSpec) DeepCopy ¶
func (in *AuthBackendRoleSpec) DeepCopy() *AuthBackendRoleSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSpec.
func (*AuthBackendRoleSpec) DeepCopyInto ¶
func (in *AuthBackendRoleSpec) DeepCopyInto(out *AuthBackendRoleSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AuthBackendRoleStatus ¶
type AuthBackendRoleStatus struct { v1.ResourceStatus `json:",inline"` AtProvider AuthBackendRoleObservation `json:"atProvider,omitempty"` }
AuthBackendRoleStatus defines the observed state of AuthBackendRole.
func (*AuthBackendRoleStatus) DeepCopy ¶
func (in *AuthBackendRoleStatus) DeepCopy() *AuthBackendRoleStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleStatus.
func (*AuthBackendRoleStatus) DeepCopyInto ¶
func (in *AuthBackendRoleStatus) DeepCopyInto(out *AuthBackendRoleStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.